A study of the flow of manuscript submissions reveals a highly structured and efficient network of scientific journals where peer-review plays a critical role in the improvement and slotting of papers.
This project brings together OII research fellows and doctoral students to shed light on the incorporation of new users and information into the Wikipedia community.
“All these papers were deliberately bad. They were created with the purpose of exposing exploitative publishing practices. That is, the works collected here were sting operations on predatory journals.” So says the introduction to the book Stinging the Predators: A collection of papers that should never have been published, assembled by Zen Faulkes.
The RFID Security and Privacy Lounge references technical works related to security and privacy in RFID systems published in journals, conference proceedings, technical reports, thesis, eprints, and books. It is maintained and updated roughtly monthly by the UCL's Information Security Group in Belgium headed by Gildas Avoine.
A STATEMENT OF COMMITMENT BY STM PUBLISHERS TO A ROADMAP TO ENABLE TEXT AND DATA MINING (TDM) FOR NON COMMERCIAL SCIENTIFIC RESEARCH IN THE EUROPEAN UNION
S. Bethard, and D. Jurafsky. Proceedings of the 19th ACM international conference on Information and knowledge management, page 609--618. New York, NY, USA, ACM, (2010)